1. I. Abraham, B. Pinkas, A. Yanai, Blinder: MPC based scalable and robust anonymous committed broadcast, in ACM CCS (2020)
2. G. Asharov, R. Cohen, O. Shochat, Static vs. adaptive security in perfect MPC: A separation and the adaptive security of BGW, in 3rd Conference on Information-Theoretic Cryptography, ITC 2022, July 5–7, 2022, Cambridge, MA, USA, volume 230 of LIPIcs, pp. 15:1–15:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2022)
3. G. Asharov, Y. Lindell, A full proof of the BGW protocol for perfectly secure multiparty computation. J. Cryptol., 30(1), 58–151 (2017)
4. G. Asharov, Y. Lindell, T. Rabin, Perfectly-secure multiplication for any $${t < n}/3$$, in P. Rogaway, editor, Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings, volume 6841 of Lecture Notes in Computer Science (Springer, 2011), pp. 240–258
5. A. Barak, D. Escudero, A.P.K. Dalskov, M. Keller, Secure evaluation of quantized neural networks. IACR Cryptol. ePrint Arch., 2019, 131 (2019)